The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The goal of this study was to research TOA exclusive tracking and deinterleaving algorithms applied to radar emitters in an EW environment for application on FPGA-based DRFM platforms. In this paper sequence search (SS), TOA difference histogram, CDIF, SDIF, CDIF with SS (CDIF SS) and SDIF with SS (SDIF SS) deinterleaving algorithms were investigated. The TOA tracking algorithms that were investigated...
This paper presents the modelling and implementation of a three-phase DSTATCOM (Distribution Static Compensator) using an efficient control algorithm for power conditioning. This is one of an effective way for harmonic suppression, load balancing and reactive power compensation at distorted PCC (Point of Common Coupling) voltages under nonlinear loads. It is hoped at providing a broad perspective...
Business and Research organizations are continuously generating huge amount of high dimensional data. They need to analyze this data in real-time with minimum cost. Data pre-processing techniques in combination with dimensionality reduction techniques are widely used by researchers to improve the quality of data and reduce the time, cost required to analyze the data. But standard methods are not available...
Data mining (DM) is the process of automated extraction of interesting data patterns representing knowledge, from the large data sets. Frequent itemsets are the itemsets that appear in a data set frequently. Finding such frequent itemsets plays an essential role in mining associations, correlations, and many other interesting relationships among itemsets in transactional database. In this paper an...
Earlier the model suggested was much generalized and simple. It was lacking in clarity about the functioning of its components, which made it difficult to be implemented. In this paper an improved model for the security policy framework is suggested, in which functioning of each component and there interconnectivity is explained clearly. The fitness functions for the system and which parameter can...
We propose a compositional stability analysis framework for verifying properties of systems that are interconnections of multiple subsystems. The proposed method assembles stability certificates for the interconnected system based on the certificates for the input-output properties of the subsystems. The decomposition in the analysis is achieved by utilizing dual decomposition ideas from optimization...
A good description of a class should be accurate and interpretable. Previous works describe classes either by analyzing the correlation of each attribute with the class, or by producing rules as in building a classifier. These solutions suffer from issues in accuracy and interpretability. A description naturally consists of sentences, where each sentence consists of a set of terms. Normally, a sentence...
Optical burst switching is a promising technology in optical network. Scheduling of data burst in data channels in an optimal way is one of a key problem in optical burst switched networks. The main concerns in this paper is to schedule the incoming bursts in proper data channel such that more burst can be scheduled so burst loss will be less. There are different algorithms exists to schedule data...
The main objective of the current paper is to design and validate a sub sate observer which can communicate the health status of the stitching needle to the stitch controller in right time without any false alert signal using Microcontroller and CPLD interfacing. This has been achieved through a design methodology of a fault aware controller which can interact with a stitch controller for automatic...
In this paper the maximum sidelobe level (SLL) reductions for various designs without and with central element feeding in three-ring concentric circular antenna arrays (CCAA) are examined using an improved particle swarm optimization algorithm (IPSO) to finally determine the global optimal three-ring CCAA design. Real coded Genetic Algorithm is also employed for comparative optimization but it proves...
Due to the mobility of hosts, limited battery power and processing power of mobile hosts, and the low bandwidth of wireless channels, the existing distributed algorithms designed for the static distributed systems required to be restructured before these can be used in the cellular wireless networks. The group mutual exclusion (GME) problem is an interesting generalization of the classical mutual...
Current deep submicron processing technologies enable integration of multiple software programmable processors and dedicated hardware components into a single integrated circuit, called System on Chip (SoC) that offers high performance and flexibility. Consequently, the nowadays motor control industry, to remain competitive, should develop high speed digital control systems based on these SoCs. In...
In this paper, we propose a fast and accurate video retrieval algorithm using random projections, an indexing structure and parallel computing. The video sequences are represented by low dimensional temporal trajectories in a set of low dimensional spaces through scaling and random projections. A kd-tree structure is used for efficient data access. We also develop an efficient retrieval algorithm...
This paper presents the development of high performance accelerating technique for DNA sequences alignment. The scope of the paper focuses on speed optimization and memory reduction of the existing technique on initialization module. The novel development of the optimization using data compression technique for accelerates the Smith-Waterman (SW) algorithm has been revealed through this paper. This...
With the growing reliance on net-centric warfare, understanding the effect of information operations (IO) on the overall mission becomes increasingly important. Traditional information assurance (IA) metrics quantify attributes of the underlying information system, such as the availability, confidentiality, and integrity of critical services and data, without providing mission-level perspective. Meanwhile,...
Given an arbitrary network G of processes with unique IDs and no designated leader, and given a k-dominating set I C G, we propose a silent self-stabilizing distributed algorithm that computes a subset D of I which is a minimal k-dominating set of G. Using D as the set of cluster-heads, a partition of G into clusters, each of radius k, follows. The algorithm is comparison-based, requires O(log n)...
Mapping of applications onto multiprocessor system-on-chip (MPSoC) can be realized either at design-time or run-time. At any time the number of tasks executing in MPSoC platform can exceed the available resources, requiring efficient run-time mapping techniques to meet the real-time constraints of the applications. This paper presents two run-time mapping heuristics for mapping the tasks of an application...
In peer to peer (P2P) systems agent based load balancing is one of the most important problem. P2P systems are characterized by decentralization, scalability and dynamicity, such that they can been seen as instances of complex adaptive systems (CAS). In this paper we present ant-based load balancing algorithm, which effectively balances loads of peers distributed among P2P systems with the help of...
Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall configurations for errors, to verify that they correctly implement security requirements and to generate configurations from higher-level requirements. In this paper we extend our...
Mining biclusters that exhibit both consistent trends and trends with similar degrees of fluctuations is vital to bioinformatics research. However, existing biclustering methods are not very efficient and effective at mining such biclusters. Most biclustering models, including those used in subspace clustering, define similarity among different objects by distances over either all or only a subset...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.